Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Active defense (1)
- Administrative Procedure Act of 1946 (1)
- Astroturfing (1)
- Case law (1)
- Clayton Act (1)
-
- Competition (1)
- Computer crimes (1)
- Conflicts of interest (1)
- Corporate-funded preferences (1)
- Corporations (1)
- Cyber Threat Intelligence Integration Center (1)
- Cybercrimes (1)
- Cyberdefense (1)
- Cybersecurity (1)
- Defense of property (1)
- Disclosure rules (1)
- Hackers (1)
- Lobbyists (1)
- Mergers (1)
- Notice and comment rulemaking (1)
- Personally identifiable information (1)
- Public interests (1)
- Regulations (1)
Articles 1 - 2 of 2
Full-Text Articles in Law
Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng
Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng
University of Michigan Journal of Law Reform
Large telecommunications companies looking to merge spend millions of dollars in their lobbying efforts to clear regulatory hurdles and obtain approval for their proposed mergers. Corporations such as AT&T, Comcast, and Time Warner use public participation processes as vehicles to influence regulatory decision-making. In the Federal Communications Commission (FCC) merger review context, the notice- and-comment process and public hearings have become fertile breeding grounds for hidden corporate influence. Corporations spend millions on corporate social responsibility programs and call upon nonprofit organizations that receive their largesse to represent their corporate interests as grassroots interests when the FCC seeks public comment. This …
What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer
What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer
University of Michigan Journal of Law Reform
This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …